International Journal of Computer Science & Information Security

International Journal of Computer Science & Information Security

IJCSIS Vol. 11 No. 11, November 2013 ISSN 1947-5500 International Journal of Computer Science & Information Security © IJCSIS PUBLICATION 2013 JCSI I S ISSN (online): 1947-5500 Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results. CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2014 Issues The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. See authors guide for manuscript preparation and submission guidelines. Indexed by Google Scholar, DBLP, CiteSeerX, Directory for Open Access Journal (DOAJ), Bielefeld Academic Search Engine (BASE), SCIRUS, Scopus Database, Cornell University Library, ScientificCommons, ProQuest, EBSCO and more. Deadline: see web site Notification: see web site Revision: see web site Publication: see web site Context-aware systems Agent-based systems Networking technologies Mobility and multimedia systems Security in network, systems, and applications Systems performance Evolutionary computation Networking and telecommunications Industrial systems Software development and deployment Evolutionary computation Knowledge virtualization Autonomic and autonomous systems Systems and networks on the chip Bio-technologies Knowledge for global defense Knowledge data systems Information Systems [IS] Mobile and distance education IPv6 Today - Technology and deployment Intelligent techniques, logics and systems Modeling Knowledge processing Software Engineering Information technologies Optimization Internet and web technologies Complexity Digital information processing Natural Language Processing Cognitive science and knowledge Speech Synthesis Data Mining For more topics, please see web site https://sites.google.com/site/ijcsis/ For more information, please visit the journal website (https://sites.google.com/site/ijcsis/) Editorial Message from Managing Editor International Journal of Computer Science and Information Security (IJCSIS – established since May 2009), is a prime venue to publicize research and development results of high significance in the theory, design, implementation, analysis, and application of computing and security. As a scholarly open access peer-reviewed international journal, the primary objective is to provide the academic community and industry a forum for sharing ideas and for the submission of original research related to Computer Science and Security. High caliber authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe latest advances in the Computer Science & Information Security. IJCSIS archives all publications in major academic/scientific databases; abstracting/indexing, editorial board and other important information are available online on homepage. Indexed by the following International agencies and institutions: Google Scholar, Bielefeld Academic Search Engine (BASE), CiteSeerX, SCIRUS, Cornell’s University Library EI, Scopus, DBLP, DOI, ProQuest, EBSCO. Google Scholar reported a large amount of cited papers published in IJCSIS. IJCSIS supports the Open Access policy of distribution of published manuscripts, ensuring "free availability on the public Internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of [published] articles". IJCSIS editorial board ensures a rigorous peer-reviewing process and consisting of international experts solicits your contribution to the journal with your research papers. IJCSIS is grateful for all the insights and advice from authors & reviewers. We look forward to your collaboration. For further questions please do not hesitate to contact us at [email protected]. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 11, No. 11, November 2013 Edition ISSN 1947-5500 © IJCSIS, USA. Journal Indexed by (among others): IJCSIS EDITORIAL BOARD Dr. Yong Li School of Electronic and Information Engineering, Beijing Jiaotong University, P. R. China Prof. Hamid Reza Naji Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Dr. Sanjay Jasola Professor and Dean, School of Information and Communication Technology, Gautam Buddha University Dr Riktesh Srivastava Assistant Professor, Information Systems, Skyline University College, University City of Sharjah, Sharjah, PO 1797, UAE Dr. Siddhivinayak Kulkarni University of Ballarat, Ballarat, Victoria, Australia Professor (Dr) Mokhtar Beldjehem Sainte-Anne University, Halifax, NS, Canada Dr. Alex Pappachen James (Research Fellow) Queensland Micro-nanotechnology center, Griffith University, Australia Dr. T. C. Manjunath HKBK College of Engg., Bangalore, India. Prof. Elboukhari Mohamed Department of Computer Science, University Mohammed First, Oujda, Morocco TABLE OF CONTENTS 1. Paper 31101326: An Integrated Public Key Infrastructure Model Based on Certificateless Cryptography (pp. 1-10) Mohammed Hassouna(1), Bazara Barri (2), Nashwa Mohamed (2), Eihab Bashier (2)(3) (1) National Ribat University, Burri, Khartoum, Sudan (2) Faculty of Mathematical Sciences, University of Khartoum, Sudan (3) Faculty of Sciences and Arts, Albaha University, Saudi Arabia Abstract — In this paper an integrated Certificateless Public Key Infrastructure (CLPKI) that focuses on key management issues is proposed. The proposed scheme provides two-factor private key authentication to protect the private key in case of device theft or compromise. The private key in the proposed scheme is not stored in the device, but rather it is calculated every time the user needs it. It depends also on a user’s chosen password and then even if the device is stolen, the attacker cannot get the private key because he/she does not know the user’s secret password. The proposed model provides many other key management features like private key recovery, private key portability and private key archiving. 2. Paper 31101324: An Attribute-Based Public Key Infrastructure (pp. 11-18) Hendri Nogueira, Jean Everson Martina and Ricardo Felipe Custódio Federal University of Santa Catarina – Florianópolis - SC, Brazi Abstract — While X.509 Public Key Infrastructures (PKIs) and X.509 Attribute Certificates (ACs) enforce strong authentication and authorization procedures (respectively), they do not give the user management over his/her own attributes. This is especially important in regards to the users’ personal information when a service provider requests more than necessary, sensitive information such as medical data, and the users need control over the attributes they are sharing. We present an Attribute-Based Public Key Infrastructure that addresses the management of users’ attributes and giving more control to the users’ concerns in identity and access management system and in documents signatures. Our user-centric scheme also simplify the confidence of the attributes validity and the verification procedures. Index Terms — Attribute-Based, Public Key Infrastructure, Identity Management, Attributes, User-Centric. 3. Paper 31101325: Map Visualization of Shortest Path Searching of Government Agency Location Using Ant Colony Algorithm (pp. 19-23) Candra Dewi and Devi Andriati, Program of Information Technology and Computer Science, Brawijaya University Abstract — The case of the shortest path searching is an issue to get the destination with the efficient time and the shortest path. Therefore, some shortest path searching system has been developed as a tool to get the destination without spent a lot of time. This paper implements the visualization of searching result for shortest path of the government agency location on the map using ant colony algorithm. Ant colony algorithm is an algorithm which has a probabilistic technique that is affected by ant pheromone. The shortest path searching considers some factors such as traffic jam, road direction, departures time and vehicle type. The testing is done to obtain the ant tracking intensity controlling constant (α) for calculation probability of route that is selected by ant and visibility controlling constant (β), therefore the optimal route would be obtained. The testing result shows that the worst accuracy value was reach when α = 0 and β = 0. On the other hand, the accuracy value close to 100% on some combination of the parameter such as (α = 0, β = 1), (α = 2, β = 1), (α=0, β=2), (α=1, β= 2) to (α=2, β = 5). It shows that the accuracy value is close to the best result. The change of parameter α and β are the main priority on the shortest path searching because the values have been produced will be used as probability value of pheromone. Keywords - shortest path; map visualization; Ant Colony algorithm; government agency location 4. Paper 31101328: Determination of Multipath Security Using Efficient Pattern Matching (pp. 24-33) James Obert, Cyber R&D Solutions, Sandia National Labs, Albuquerque, NM, USA Huiping Cao, Computer Science Department, New Mexico State University, Las Cruces, NM, USA Abstract — Multipath routing is the use of multiple potential paths through a network in order to enhance fault tolerance,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    126 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us